Establishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks

Similar documents
Establishing two-factor authentication with Barracuda SSL VPN and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Juniper SSL VPN and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with FortiGate and HOTPin authentication server from Celestix Networks

Welcome to Adobe. This document will help you with initial account setup and password reset.

Integration Guide. LoginTC

Setup Citrix Receiver Standalone App

RapidIdentity Mobile Guide

UNT System Campus VPN Guide

Manual for configuring VPN in Windows 7

HOTPin Software Instructions. Mac Client

goremote.carolinas.org

Technical Bulletin, November 2014

Procedure to Connect NIC VPN in Windows for ebiz

Remote Access User Guide for Mac OS (Citrix Instructions)

Cisco Voice Services Self-Care Portal User Guide

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Using the Vita Group Citrix Portal

3.1 Getting Software and Certificates

Microsoft DirectAccess

<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide

Contents. Multi-Factor Authentication Overview. Available MFA Factors

Multi-factor Authentication Instructions

owncloud Android App Manual

Connect to Wireless, certificate install and setup Citrix Receiver

Two factor authentication for Cisco ASA SSL VPN

MFA (Multi-Factor Authentication) Enrollment Guide

OneLogin Integration User Guide

Table of Contents 1 Cisco AnyConnect...1

Multi-factor Authentication Instructions

Remote Access with Imprivata Two-factor Authentication

External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide

SASSL v1.0 Managing Advanced Cisco SSL VPN. 3 days lecture course and hands-on lab $2,495 USD 25 Digital Version

Accessing Skyward Mobile Access App

Software Token Enrollment: SafeNet MobilePASS+ for Apple ios

etrac ATOM Android App Setup Guide

Technical Overview: Always On VPN

Using CSE Cisco Anyconnect with 2FA

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Cisco ASA

IT Access Portal User Guide (Employees)

Virtua Dual Authentication Entrust IdentityGuard Enrollment

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook

pending Checking your just got easier. AGENT NET INFO MOBILE PENDING Android BlackBerry iphone View View View

<Partner Name> RSA SECURID ACCESS. VMware Horizon View Client 6.2. Standard Agent Implementation Guide. <Partner Product>

Using Citrix to access QFIS and other applications

Integration Guide. SafeNet Authentication Service (SAS)

Authentication Options

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Student Access to Smith s Wood Sports College Remote Applications

Hollins University VPN

Extract from the ARC & RVRC Operational & Administrative Procedures

SurePassID Local Agent Guide SurePassID Authentication Server 2016

Qualys Cloud Platform (VM, PC) v8.x Release Notes

The University of Toledo Intune End-User Enrollment Guide:

Barracuda Networks SSL VPN

DevNet Sandbox Collaboration 11.5

ONESolution 16.1 Desktop Client Installation

Remote Access VPN Setup

Accessing Insurance Portal/PAS Job Aid Single Sign-On

SET UP VPN FOR WINDOWS 10

Getting Started New User. To begin, open the Multi-Factor Authentication Service in your inbox.

Entrust PartnerLink Login Instructions

Device LinkUP + VIN. Service + Desktop LP Guide RDP

Document for connecting an ipad/iphone to the University VPN System

MSU Authorized User Campus Access Procedure, Campus VPN

Virtua Dual Authentication Entrust IdentityGuard Enrollment

Enrolling Devices in Duo

CMS-i First Time Activation User Guide

SurePassID ServicePass User Guide. SurePassID Authentication Server 2017

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide

Client VPN OS Configuration. Android

User Guide. NetScaler Gateway Access

Cloud UC. Program Downloads I WOULD LIKE TO... DOWNLOADING THE CLIENT SOFTWARE

User Guide for Client Remote Access. Version 1.2

The Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING. VPN Web Portal Usage Guide

HLZA HOW-TO S SETTING UP AND USING REMOTE ACCESS. July 10, 2014

Quick Guide for Mynaportal

What Is Wireless Setup

Mobility Manager 9.5. Users Guide

QUICK NOTE: MULTI-FACTOR AUTHENTICATION

Multi-factor authentication enrollment guide for Deloitte practitioners

Nextiva Drive The Setup Process Mobility & Storage Option

Installing and Connecting to the SOM VPN using the Cisco AnyConnect version 4.x Client (Windows)

External Authentication with Ultra Protect v7.2 SSL VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

owncloud Android App Manual

ESET SECURE AUTHENTICATION. Cisco ASA SSL VPN Integration Guide

Self-Service Portal Registering, downloading & activating a soft token

DevNet Sandbox UC Manager 11.0 and Presence

CKHS VPN Connection Instructions

RSA SecurID Ready Implementation Guide

Accessing Positive Networks on an ipad/iphone

Remote Access Instructions. remote.gpmlaw.com

Texas Division How to Login and Register for My IT Support and ServiceNow

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide

Checkpoint R80.10 Integration Guide (ASA)

MICROSOFT OFFICE Desktop Applications. Student User Guide Overview

Google Authenticator User Guide

Outside Access System Manual

CMS-i First Time Activation User Guide

Transcription:

Establishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix Networks APAC Integration completed by Paul Fearns info@celestix.com 3125 Skyway Court, Fremont, California, 94539, USA +1 510 668 0700 30 Queens Road, Reading, RG1 4AU, United Kingdom +44 (0)118 959 6198 1 Changi North Street 1, #02-02, Singapore 498789 +65 6781 0700 pfearns@celestix.com

This document outlines the steps required to protect Cisco ASA 5500 (AnyConnect VPN) with Celestix HOTPin two-factor authentication. The following steps are detailed within this guide: Adding users Enabling user self provisioning Configuring RADIUS integration in Cisco Adding Cisco as a RADIUS client in Celestix HOTPin Testing the login process Steps to Configure Standalone Celestix HOTPin v3.5 Prerequisites This document assumes you have followed the steps in the HOTPin Quick Start Guide, and either installed HOTPin Server v3.5, or configured your HSA Appliance ready for use. If you haven't already done so, please refer to the Quick Start Guide to complete this before proceeding. The Quick Start Guide can be found here: http://www.celestix.com/hotpin-tl.html Step 1: Launch HOTPin Administration Launch the HOTPin Management GUI using the shortcut icon on the desktop. This will load the default web browser. HOTPin ships with a default certificate to provide HTTPS security. The browser will display a certificate security warning, this is normal, choose Continue to this website. Microsoft Windows User Access Control will prompt for a username and password. Enter the administrator credentials. NOTE - depending on the web browser and the default settings, the message might be slightly different. Step 2: Adding users To add users go to HOTPin > Users. Click on New. Complete the user settings for an end user. Token Key: (none) Client Software (default) PIN: User will create PIN For production and full installation we recommend you make use of the Active Directory import feature within HOTPin, and then enable Active Directory Synchronization. This can be achieved easily and simply through the main Management GUI.

Step 3: Configure the user provisioning website From the main Management GUI, go to User Website and tick the Enable user website box. This will allow your users to provision a variety of tokens by accessing a user provisioning portal, but it is important to configure this in advance of giving access. Once enabled, default access to the site is: https://(appliancehostname IP):8098/hotpin/ This site is not enabled by default; it must be turned on by Administrators. At this point, the basic configuration for Celestix HOTPin is complete, and we'll return to the User Provisioning Website later. Configure RADIUS integration in Cisco Step 4: Add an Authentication Server Open up ADSM. Select Configuration (top left button) Select Remote Access VPN Select AAA / Local Users Select AAA server groups Click Add Give the group a name (for example HOTPIN ) Choose RADIUS as the protocol. (Other settings can be left as default).

Add the HOTPin server into the AAA Server Group. Click Add in the bottom half of the screen. Enter HOTPin server details. Ensure the port numbers and server secret key are correct. Step 5: Configure AnyConnect Connection profile Select HOTPin server group as the AAA authentication server. Complete the rest of the profile as the environment dictates. Step 6: Enabling RADIUS client on Celestix HOTPin Go to HOTPin > NPS Radius > RADIUS clients > New. Tick Enable this RADIUS client. Enter name and IP address of the Cisco box. Apply shared secret. This completes the integration process. Next we ll test the login process. Testing the login process Celestix HOTPin supports the following platforms for generating a one-time password. Generate a one-time password using any of the client software below. Microsoft Windows Android devices MacOS Windows phone devices ios devices (iphones and ipads) Blackberry devices.

Step 7: Log on to end user provisioning website. Go to User Website and click on the link for example this URL https://(appliancehostname IP):8098/hotpin/ After you have downloaded the HOTPin app to your Smart Device, log on to the end user provisioning site with your Active Directory credentials. Step 8: Create Token Key Go to Token Key > QR Code. Enter QR code passphrase: Create a passphrase of at least 6 characters. Confirm passphrase. Code size: Select the image size. Generate QR Code: Click to create the image. Open the HOTPin app on your smart device. Choose Import from QR Code. Scan the QR Code. Enter the passphrase. Click on Import (IPhone) or OK with Android). You are now able to generate a one time password and this completes the one time device provisioning process. Log on back to the user provisioning website and choose HOTPin to authenticate. Further Help For further help, go to http://www.celestix.com